Three of the 16 bulletins accounted for 34 of the vulnerabilities. Most security experts deemed bulletin MS10-071, which provides a cumulative security update for 10 bugs in Internet Explorer (IE), and MS10-076, which addresses a single vulnerability in the Embedded OpenType Font Engine, as the most high-priority fixes. Both can be exploited to execute remote code.

Only one of the IE vulnerabilities impacts the newest version of the browser, IE 8. The latter bulletin, meanwhile, corrects an issue "in the way Windows handles fonts and can be triggered by a simple malicious web page without interaction from the user, making it a good candidate for a drive-by [download] infection campaign," wrote Wolfgang Kandek, CTO of vulnerability management firm Qualys, in a Tuesday blog post.

Microsoft also encouraged administrators to consider MS10-077, which addresses a .NET Framework issue, and MS10-075, which addresses a flaw in Windows Media Player, as urgent fixes.

Two other low-priority fixes address issues in the popular Office program, Kandek said. Both permit remote code execution, but for the vulnerabilities to be exploited, users must be tricked into opening a malicious file.

Tuesday's update also closes one of the two remaining zero-day, privilege-escalation vulnerabilities being leveraged by Stuxnet attackers, according to security researchers. Stuxnet is a pernicious worm that has been used to attack critical infrastructure facilities, mainly in Iran, India and Indonesia.

Jason Miller, data and security team leader at security firm Shavlik Technologies, said IT pros shouldn't necessarily be surprised by the seeming rising number of bugs being patched each month by Microsoft. Before this month, the previous patch batch record was set two months ago, when Microsoft pushed out fixes for 34 flaws.

"There are a couple of factors that are coming into play for this," Miller said. "First, Microsoft is the grandfather of patching and has spent years refining their process to develop the mature patching process we see today. Second, Microsoft is working closer than ever with security researchers in their Coordinated Vulnerability Disclosure program [announced in July]. By working with researchers, Microsoft is closing the gap on the time to release fixes for vulnerabilities found."

Still outstanding is a patch to resolve a new attack vector, involving a class of vulnerabilities, known as DLL preloading, that can be used to infect PCs when an application is tricked into loading a malicious library.